AI

Microsoft Claims Its New Tool Can Correct AI Hallucinations 50

An anonymous reader quotes a report from TechCrunch: Microsoft today revealed Correction, a service that attempts to automatically revise AI-generated text that's factually wrong. Correction first flags text that may be erroneous -- say, a summary of a company's quarterly earnings call that possibly has misattributed quotes -- then fact-checks it by comparing the text with a source of truth (e.g. uploaded transcripts). Correction, available as part of Microsoft's Azure AI Content Safety API (in preview for now), can be used with any text-generating AI model, including Meta's Llama and OpenAI's GPT-4o.

"Correction is powered by a new process of utilizing small language models and large language models to align outputs with grounding documents," a Microsoft spokesperson told TechCrunch. "We hope this new feature supports builders and users of generative AI in fields such as medicine, where application developers determine the accuracy of responses to be of significant importance."
Experts caution that this tool doesn't address the root cause of hallucinations. "Microsoft's solution is a pair of cross-referencing, copy-editor-esque meta models designed to highlight and rewrite hallucinations," reports TechCrunch. "A classifier model looks for possibly incorrect, fabricated, or irrelevant snippets of AI-generated text (hallucinations). If it detects hallucinations, the classifier ropes in a second model, a language model, that tries to correct for the hallucinations in accordance with specified 'grounding documents.'"

Os Keyes, a PhD candidate at the University of Washington who studies the ethical impact of emerging tech, has doubts about this. "It might reduce some problems," they said, "But it's also going to generate new ones. After all, Correction's hallucination detection library is also presumably capable of hallucinating." Mike Cook, a research fellow at Queen Mary University specializing in AI, added that the tool threatens to compound the trust and explainability issues around AI. "Microsoft, like OpenAI and Google, have created this issue where models are being relied upon in scenarios where they are frequently wrong," he said. "What Microsoft is doing now is repeating the mistake at a higher level. Let's say this takes us from 90% safety to 99% safety -- the issue was never really in that 9%. It's always going to be in the 1% of mistakes we're not yet detecting."
Twitter

X Circumvents Court-Ordered Block In Brazil (theguardian.com) 81

Late last month, Brazilian Justice Alexandre de Moraes ordered X to suspend operations in Brazil after a months-long dispute with X owner Elon Musk. The conflict centered on Musk's refusal to appoint a legal representative in the country and his refusal to take down disinformation and far-right accounts. However, on Wednesday, X bypassed the court-ordered block by utilizing third-party cloud services, allowing many Brazilian users to access the platform without the need for a virtual private network (VPN). From a report: The number of Brazilians accessing X is unknown, according to [Abrint, the Brazilian Association of Internet and Telecommunications Providers]. "I believe the change was probably intentional. Why would X use a third-party service that ends up being slower than its own?" said Basilio Perez, a board member at Abrint.

Any revised order from Brazil's national telecommunications agency Anatel, which is responsible for implementing the court ruling, will need to be more specific, because blocking cloud access is complex and may jeopardize government agencies and financial services providers, Perez said.

Anatel has identified the problem and is working to first notify content delivery network providers, followed by telecom companies to block access again to X in Brazil, according to a person familiar with the situation. The same person said it is not clear how long it will take for the providers to comply with the order...

In a statement tweeted from X's global government affairs account, the company said the restoration of service was an "inadvertent and temporary" side-effect of switching network providers.

Medicine

Apple Watch Sleep Apnea Detection Gets FDA Approval 31

The FDA has approved sleep apnea detection on the Apple Watch Series 9, Series 10, and Watch Ultra 2. "The green light comes four days ahead of the Series 10's September 20 release date," notes TechCrunch. From the report: The feature, announced at last week's iPhone 16 event, will arrive as part of the imminent watchOS 11 release. Once enabled, it requires 10 nights of sleep tracking data spread out over a 30-day span to determine whether a user may have the condition. During that time, it also offers insights into nightly sleeping disturbances, utilizing the on-board accelerometer.

The FDA classes the feature as an "over-the-counter device to assess risk of sleep apnea." Apple is quick to note that the addition is not a diagnostic tool. Rather, it will prompt users to seek a formal diagnosis from a healthcare provider. The condition, which causes breathing to become shallower or repeatedly stop during the night, is associated with a variety of different symptoms. The Mayo Clinic notes that it can cause insomnia, headaches, daytime sleepiness, and other longer-term conditions.
Iphone

'I Don't Get Why Apple's Multitrack Voice Memos Require an iPhone 16 Pro' (engadget.com) 63

Apple unveiled a multitrack recording feature for Voice Memos at its recent iPhone event, exclusive to the iPhone 16 Pro. The feature allows users to layer vocals over guitar tracks without headphones, utilizing advanced microphone technology and machine learning algorithms to reduce ambient noise.

Engadget argues the feature's exclusivity to the new $1,000+ model is unnecessary, given modern smartphones' processing power far exceeds that of early digital audio workstations. They contend that basic multitrack recording functionality could be implemented on older iPhone models. Apple's decision to limit this feature contradicts its inclusion of GarageBand on all iPhones and the availability of Audio Mix on base iPhone 16 models, which offers similar noise reduction capabilities. The story adds: Why is this particular feature walled behind the iPhone 16 Pro? It's a simple multitrack recording function. From the ad, it looks like the app can't even layer more than two tracks at a time. This can't exactly be taxing that A18 Pro chip, especially when the phone can also handle 4K/120 FPS video recording in Dolby Vision.
Android

Android Earthquake Alerts Now Available Across All 50 States, 6 US Territories (droid-life.com) 29

Google's Android Earthquake Alerts System, initially launched in 2020, is now available in all 50 U.S. states and 6 territories. Droid Life reports: For users in California, Oregon and Washington, users will continue to have their alerts powered by the ShakeAlert system, utilizing traditional seismometers to detect earthquakes. For all out states and supported territories, "this expansion uses the built-in accelerometers in Android phones to bring another layer of preparedness and potentially life-saving information to people across every state," the company explained in a blog post.

Using the accelerometer to sense vibrations and an apparent earthquake, the system quickly analyzes the crowdsourced data to determine if an earthquake is occurring. Google says it has been working with many experts to continue the system's improvement. Depending on the severity of the earthquake, you'll get two types of notifications. A little pop up on your screen if it's pretty weak with light shaking or a complete screen takeover for moderate to extreme shaking. These are called Take Action alerts, complete with the classic drop, cover, and hold instructions.

PHP

Hackers Have Found an Entirely New Way To Backdoor Into Microsoft Windows (security.com) 63

A university in Taiwan was breached with "a previously unseen backdoor (Backdoor.Msupedge) utilizing an infrequently seen technique," Symantec reports. The most notable feature of this backdoor is that it communicates with a command-and-control server via DNS traffic... The code for the DNS tunneling tool is based on the publicly available dnscat2 tool. It receives commands by performing name resolution... Msupedge not only receives commands via DNS traffic but also uses the resolved IP address of the C&C server (ctl.msedeapi[.]net) as a command. The third octet of the resolved IP address is a switch case. The behavior of the backdoor will change based on the value of the third octet of the resolved IP address minus seven...

The initial intrusion was likely through the exploit of a recently patched PHP vulnerability (CVE-2024-4577). The vulnerability is a CGI argument injection flaw affecting all versions of PHP installed on the Windows operating system. Successful exploitation of the vulnerability can lead to remote code execution.

Symantec has seen multiple threat actors scanning for vulnerable systems in recent weeks. To date, we have found no evidence allowing us to attribute this threat and the motive behind the attack remains unknown.

More from The Record: Compared to more obvious methods like HTTP or HTTPS tunneling, this technique can be harder to detect because DNS traffic is generally considered benign and is often overlooked by security tools. Earlier in June, researchers discovered a campaign by suspected Chinese state-sponsored hackers, known as RedJuliett, targeting dozens of organizations in Taiwan, including universities, state agencies, electronics manufacturers, and religious organizations. Like many other Chinese threat actors, the group likely targeted vulnerabilities in internet-facing devices such as firewalls and enterprise VPNs for initial access because these devices often have limited visibility and security solutions, researchers said.
Additional coverage at The Hacker News.

Thanks to Slashdot reader joshuark for sharing the article.
Robotics

Figure AI's Humanoid Robot Helped Assemble BMWs At US Factory (arstechnica.com) 12

An anonymous reader quotes a report from Ars Technica: Unlike Tesla, which hopes to develop its own bipedal 'bot to work on its production line sometime next year, BMW has brought in a robot from Figure AI. The Figure 02 robot has hands with sixteen degrees of freedom and human-equivalent strength. "We are excited to unveil Figure 02, our second-generation humanoid robot, which recently completed successful testing at the BMW Group Plant Spartanburg. Figure 02 has significant technical advancements, which enable the robot to perform a wide range of complex tasks fully autonomously," said Brett Adcock, founder and CEO of Figure AI.

BMW wanted to test how to integrate a humanoid robot into its production process -- how to have the robot communicate with the production line software and human workers and determine what requirements would be necessary to add robots to the mix. The Figure robot was given the job of inserting sheet metal parts into fixtures as part of the process of making a chassis. BMW says this required particular dexterity and that it's an ergonomically awkward and tiring task for humans.

Now that the trial is over, Figure's robot is no longer working at Spartanburg, and BMW says it has "no definite timetable established" to add humanoid robots to its production lines. "The developments in the field of robotics are very promising. With an early-test operation, we are now determining possible applications for humanoid robots in production. We want to accompany this technology from development to industrialization," said Milan Nedeljkovi, BMW's board member responsible for production.
BMW Group published a video of the Figure 02 robot on YouTube.
Google

Google Near $23 Billion Deal for Cybersecurity Startup Wiz (wsj.com) 15

Alphabet, Google's parent company, is reportedly in advanced negotiations to acquire cloud security startup Wiz for approximately $23 billion, Wall Street Journal reported on Sunday. The potential deal, which would value Wiz at nearly double its most recent private valuation of $12 billion, underscores the growing importance of cybersecurity in Alphabet's enterprise strategy as it seeks to narrow the gap with cloud computing rivals such as Microsoft, Morgan Stanley said in a note.

Founded in January 2020, Wiz has quickly established itself as a leading player in the Cloud-Native Application Protection Platform (CNAPP) space, utilizing an agentless approach to secure cloud application deployments throughout their lifecycle. The company's platform continuously assesses and prioritizes critical risks across various security domains, providing customers with a comprehensive view of their cloud security posture. Wiz has experienced rapid growth since its inception, with annual recurring revenue (ARR) exceeding $350 million as of January 2024, representing a year-over-year increase of over 75%. The company boasts an impressive client roster, with more than 40% of Fortune 100 companies among its customers, and has raised nearly $2 billion in funding to date.

If confirmed, the acquisition would mark Alphabet's largest to date, significantly expanding its footprint in the burgeoning cloud security market. The move follows previous security-focused acquisitions by the tech giant, including the $5.4 billion purchase of Mandiant in 2022 and the $500 million acquisition of Siemplify. Morgan Stanley adds that the potential acquisition could raise questions about Wiz's ability to maintain neutrality across multiple cloud platforms, potentially benefiting competitors such as Palo Alto Networks and CrowdStrike in the near term.
SuSE

SUSE Upgrades Its Distros With 19 Years of Support (zdnet.com) 36

An anonymous reader quotes a report from ZDNet: At SUSECon in Berlin, SUSE, a global Linux and cloud-native software leader, announced significant enhancements across its entire Linux distribution family. These new capabilities focus on providing faster time-to-value and reduced operational costs, emphasizing the importance of choice in today's complex IT landscape. SUSE Linux Enterprise Server (SLES) 15 Service Pack (SP) 6 is at the heart of these upgrades. This update future-proofs IT workloads with a new Long Term Service (LTS) Pack Support Core. How long is long-term? Would you believe 19 years? This gives SLES the longest-term support period in the enterprise Linux market. Even Ubuntu, for which Canonical recently extended its LTS to 12 years, doesn't come close.

You may ask yourself, "Why 19 years?" SUSE General Manager of Business Critical Linux (BCL) Rick Spencer, explained in an interview that the reason is that on 03:14:08 Greenwich Mean Time (GMT, aka Coordinated Universal Time) Tuesday, January 19, 2038, we reach the end of computing time. Well, not really, but Linux, and all the other Unix-based operating systems, including some versions of MacOS, reach what's called the Epoch. That's when the time-keeping code in 32-bit Unix-based operating systems reaches the end of the seconds it's been counting since the beginning of time -- 00:00:00 GMT on January 1, 1970, as far as Linux and Unix systems are concerned -- and resets to zero. Just like the Y2K bug, that means that all unpatched 32-bit operating systems and software will have fits. The Linux kernel itself had the problem fixed in 2020's Linux 5.6 kernel, but many other programs haven't dealt with it. Until then, though, if you're still running SLES 15 SP6, you'll be covered. I strongly suggest upgrading before then, but if you want to stick with that distro to the bitter end, you can.
The new SLES also boasts enhanced security features like confidential computing support with encryption in memory, utilizing Intel TDX and AMD SEV processors, along with remote attestation via SUSE Manager. Additionally, SLES for SAP Applications 15 SP6 offers a secure and reliable platform for running mission-critical SAP workloads, incorporating innovations from Trento to help system administrators avoid infrastructure issues.
XBox (Games)

Micrsoft Confirms Cheaper All-Digital Xbox Series X As It Marches Beyond Physical Games (kotaku.com) 72

Microsoft has announced a new lineup of Xbox consoles, including an all-digital white Xbox Series X with a 1TB SSD, priced at $450. The company is also retiring the Carbon Black Series S, replacing it with a white version featuring a 1TB SSD and a $350 price point. Additionally, a new Xbox Series X with a disc drive and 2TB of storage will launch for $600.

The move comes as Microsoft continues to focus on digital gaming and subscription services like Game Pass, with reports suggesting that the PS5 is outselling Xbox Series consoles 2:1. The shift has led to minimal physical Xbox game sections in stores and some first-party titles, like Hellblade 2, not receiving physical releases. Despite rumors of a multiplatform approach, Microsoft maintains its commitment to its own gaming machines, promising a new "next-gen" console in the future, potentially utilizing generative-AI technology.

Further reading: Upcoming Games Include More Xbox Sequels - and a Medieval 'Doom'.
Earth

Vast DNA Tree of Life For Plants Revealed By Global Science Team 11

An international team of scientists used 1.8 billion letters of genetic code from more than 9,500 species covering almost 8,000 known flowering plant genera to create the most up-to-date understanding of the flowering plant tree of life. The research has been published in the journal Nature. Phys.Org reports: The major milestone for plant science, led by [Royal Botanic Gardens, Kew] and involving 138 organizations internationally, was built on 15 times more data than any comparable studies of the flowering plant tree of life. Among the species sequenced for this study, more than 800 have never had their DNA sequenced before. The sheer amount of data unlocked by this research, which would take a single computer 18 years to process, is a huge stride towards building a tree of life for all 330,000 known species of flowering plants -- a massive undertaking by Kew's Tree of Life Initiative.

The flowering plant tree of life, much like our own family tree, enables us to understand how different species are related to each other. The tree of life is uncovered by comparing DNA sequences between different species to identify changes (mutations) that accumulate over time like a molecular fossil record. Our understanding of the tree of life is improving rapidly in tandem with advances in DNA sequencing technology. For this study, new genomic techniques were developed to magnetically capture hundreds of genes and hundreds of thousands of letters of genetic code from every sample, orders of magnitude more than earlier methods. A key advantage of the team's approach is that it enables a wide diversity of plant material, old and new, to be sequenced, even when the DNA is badly damaged. The vast treasure troves of dried plant material in the world's herbarium collections, which comprise nearly 400 million scientific specimens of plants, can now be studied genetically.

[...] Across all 9,506 species sequenced, more than 3,400 came from material sourced from 163 herbaria in 48 countries. Additional material from plant collections around the world (e.g., DNA banks, seeds, living collections) have been vital for filling key knowledge gaps to shed new light on the history of flowering plant evolution. The team also benefited from publicly available data for more than 1,900 species, highlighting value of the open science approach to future genomic research. Flowering plants alone account for about 90% of all known plant life on land and are found virtually everywhere on the planet -- from the steamiest tropics to the rocky outcrops of the Antarctic Peninsula. [...] Utilizing 200 fossils, the authors scaled their tree of life to time, revealing how flowering plants evolved across geological time. They found that early flowering plants did indeed explode in diversity, giving rise to more than 80% of the major lineages that exist today shortly after their origin. However, this trend then declined to a steadier rate for the next 100 million years until another surge in diversification about 40 million years ago, coinciding with a global decline in temperatures. These new insights would have fascinated Darwin and will surely help today's scientists grappling with the challenges of understanding how and why species diversify.
A list of "remarkable species" included in the flowering plant tree of life is embedded below the article.

Looking ahead, the study's authors believe this data will aid future attempts to identify new species, refine plant classification, uncover new medicinal compounds, and conserve plants in the face of climate change and biodiversity loss.
Cellphones

OnePlus Watch 2 Launches With Wear OS 4, 100-Hour Battery (9to5google.com) 14

Almost 3 years after launching the first OnePlus Watch, the Chinese smartphone company is launching a successor -- this time powered by Wear OS 4. Utilizing a "hybrid interface," the OnePlus Watch 2 is able to offer 100 hours of battery life, or just over four full days of use. 9to5Google reports: To achieve that goal, the OnePlus Watch 2 actually runs two separate operating systems. Wear OS handles things like apps and watchfaces, while a RTOS powered by a secondary chipset handles more lightweight tasks. A "smart mode" on the watch allows the watch swap back and forth between its two operating systems and two chipsets. Wear OS is powered by the Snapdragon W5 Gen 1 and it is Wear OS 4. The RTOS is powered by a BES 2700 MCU Efficiency chipset.

Switching between the two OS's is something you're likely to not even notice, OnePlus claims: "The BES2700 Efficiency Chipset runs RTOS and handles background activity and simple tasks, while the Snapdragon W5 handles more demanding tasks, like running your favorite Google apps. This optimized approach, enabled by the Wear OS hybrid interface seamlessly managing the transition between chips, means users will experience a smartwatch that effortlessly does it all while extending the time between charges."

Powering the Watch 2 is a 500 mAh battery which features 7.5W charging with a special charger that connects to a typical USB-C cable. The charger is magnetic, of course, and OnePlus claims a full charge in 60 minutes or less. The 1.43-inch AMOLED display of the OnePlus Watch 2 is covered in a slightly curved sapphire glass, while the watch chassis is built from stainless steel. You'll have the choice of black or silver colors with either black or green bands, respectively. The whole package is also 5ATM water resistant. Rounding out the main specs you'll find 32GB of storage and 2GB of RAM.
The OnePlus Watch 2 goes on sale today at $299.
Security

MIT Researchers Build Tiny Tamper-Proof ID Tag Utilizing Terahertz Waves (mit.edu) 42

A few years ago, MIT researchers invented a cryptographic ID tag — but like traditional RFID tags, "a counterfeiter could peel the tag off a genuine item and reattach it to a fake," writes MIT News.

"The researchers have now surmounted this security vulnerability by leveraging terahertz waves to develop an antitampering ID tag that still offers the benefits of being tiny, cheap, and secure." They mix microscopic metal particles into the glue that sticks the tag to an object, and then use terahertz waves to detect the unique pattern those particles form on the item's surface. Akin to a fingerprint, this random glue pattern is used to authenticate the item, explains Eunseok Lee, an electrical engineering and computer science (EECS) graduate student and lead author of a paper on the antitampering tag. "These metal particles are essentially like mirrors for terahertz waves. If I spread a bunch of mirror pieces onto a surface and then shine light on that, depending on the orientation, size, and location of those mirrors, I would get a different reflected pattern. But if you peel the chip off and reattach it, you destroy that pattern," adds Ruonan Han, an associate professor in EECS, who leads the Terahertz Integrated Electronics Group in the Research Laboratory of Electronics.

The researchers produced a light-powered antitampering tag that is about 4 square millimeters in size. They also demonstrated a machine-learning model that helps detect tampering by identifying similar glue pattern fingerprints with more than 99 percent accuracy. Because the terahertz tag is so cheap to produce, it could be implemented throughout a massive supply chain. And its tiny size enables the tag to attach to items too small for traditional RFIDs, such as certain medical devices...

"These responses are impossible to duplicate, as long as the glue interface is destroyed by a counterfeiter," Han says. A vendor would take an initial reading of the antitampering tag once it was stuck onto an item, and then store those data in the cloud, using them later for verification."

Seems like the only way to thwart that would be carving out the part of the surface where the tag was affixed — and then pasting the tag, glue, and what it adheres to all together onto some other surface. But more importantly, Han says they'd wanted to demonstrate "that the application of the terahertz spectrum can go well beyond broadband wireless."

In this case, you can use terahertz for ID, security, and authentication. There are a lot of possibilities out there."
Programming

How Rust Improves the Security of Its Ecosystem (rust-lang.org) 45

This week the non-profit Rust Foundation announced the release of a report on what their Security Initiative accomplished in the last six months of 2023. "There is already so much to show for this initiative," says the foundation's executive director, "from several new open source security projects to several completed and publicly available security threat models."

From the executive summary: When the user base of any programming language grows, it becomes more attractive to malicious actors. As any programming language ecosystem expands with more libraries, packages, and frameworks, the surface area for attacks increases. Rust is no different. As the steward of the Rust programming language, the Rust Foundation has a responsibility to provide a range of resources to the growing Rust community. This responsibility means we must work with the Rust Project to help empower contributors to participate in a secure and scalable manner, eliminate security burdens for Rust maintainers, and educate the public about security within the Rust ecosystem...

Recent Achievements of the Security Initiative Include:

- Completing and releasing Rust Infrastructure and Crates Ecosystem threat models

- Further developing Rust Foundation open source security project Painter [for building a graph database of dependencies/invocations between crates] and releasing new security project, Typomania [a toolbox to check for typosquatting in package registries].

- Utilizing new tools and best practices to identify and address malicious crates.

- Helping reduce technical debt within the Rust Project, producing/contributing to security-focused documentation, and elevating security priorities for discussion within the Rust Project.

... and more!

Over the Coming Months, Security Initiative Engineers Will Primarily Focus On:

- Completing all four Rust security threat models and taking action to address encompassed threats

- Standing up additional infrastructure to support redundancy, backups, and mirroring of critical Rust assets

- Collaborating with the Rust Project on the design and potential implementation of signing and PKI solutions for crates.io to achieve security parity with other popular ecosystems

- Continuing to create and further develop tools to support Rust ecosystem, including the crates.io admin functionality, Painter, Typomania, and Sandpit

Medicine

AI Cannot Be Used To Deny Health Care Coverage, Feds Clarify To Insurers 81

An anonymous reader quotes a report from Ars Technica: Health insurance companies cannot use algorithms or artificial intelligence to determine care or deny coverage to members on Medicare Advantage plans, the Centers for Medicare & Medicaid Services (CMS) clarified in a memo (PDF) sent to all Medicare Advantage insurers. The memo -- formatted like an FAQ on Medicare Advantage (MA) plan rules -- comes just months after patients filed lawsuits claiming that UnitedHealth and Humana have been using a deeply flawed, AI-powered tool to deny care to elderly patients on MA plans. The lawsuits, which seek class-action status, center on the same AI tool, called nH Predict, used by both insurers and developed by NaviHealth, a UnitedHealth subsidiary.

According to the lawsuits, nH Predict produces draconian estimates for how long a patient will need post-acute care in facilities like skilled nursing homes and rehabilitation centers after an acute injury, illness, or event, like a fall or a stroke. And NaviHealth employees face discipline for deviating from the estimates, even though they often don't match prescribing physicians' recommendations or Medicare coverage rules. For instance, while MA plans typically provide up to 100 days of covered care in a nursing home after a three-day hospital stay, using nH Predict, patients on UnitedHealth's MA plan rarely stay in nursing homes for more than 14 days before receiving payment denials, the lawsuits allege.

It's unclear how nH Predict works exactly, but it reportedly uses a database of 6 million patients to develop its predictions. Still, according to people familiar with the software, it only accounts for a small set of patient factors, not a full look at a patient's individual circumstances. This is a clear no-no, according to the CMS's memo. For coverage decisions, insurers must "base the decision on the individual patient's circumstances, so an algorithm that determines coverage based on a larger data set instead of the individual patient's medical history, the physician's recommendations, or clinical notes would not be compliant," the CMS wrote.
"In all, the CMS finds that AI tools can be used by insurers when evaluating coverage -- but really only as a check to make sure the insurer is following the rules," reports Ars. "An 'algorithm or software tool should only be used to ensure fidelity,' with coverage criteria, the CMS wrote. And, because 'publicly posted coverage criteria are static and unchanging, artificial intelligence cannot be used to shift the coverage criteria over time' or apply hidden coverage criteria."

The CMS also warned insurers to ensure that any AI tool or algorithm used "is not perpetuating or exacerbating existing bias, or introducing new biases." It ended its notice by telling insurers that it is increasing its audit activities and "will be monitoring closely whether MA plans are utilizing and applying internal coverage criteria that are not found in Medicare laws."
Transportation

Fiber Optics Bring You Internet. Now They're Also Listening To Trains (wired.com) 21

An anonymous reader quotes a report from Wired: Stretching thousands upon thousands of miles under your feet, a web of fibrous ears is listening. Whether you walk over buried fiber optics or drive a car across them, above-ground activity creates a characteristic vibration that ever-so-slightly disturbs the way light travels through the cables. With the right equipment, scientists can parse that disturbance to identify what the source was and when exactly it was roaming there. This quickly proliferating technique is known as distributed acoustic sensing, or DAS, and it's so sensitive that researchers recently used it to monitor the cacophony of a mass cicada emergence. Others are using the cables as an ultra-sensitive instrument for detecting volcanic eruptions and earthquakes: Unlike a traditional seismometer stuck in one place, a web of fiber optic cables can cover a whole landscape, providing unprecedented detail of Earth's rumblings at different locations. Now scientists are experimenting with bringing DAS to a railroad near you.

When a train runs along a section of track, it creates vibrations that analysts can monitor over time -- if that signal suddenly changes, it might indicate a problem with the rail, like a crack, or a snapped tie. Or if on a mountain pass a rockslide blasts across the track, DAS might "hear" that too, warning railroad operators of a problem that human eyes hadn't yet glimpsed. More gradual changes in the signal might betray the development of faults in track alignment. It just so happens that fiber optic cables already run along many railways to connect all the signaling equipment or for telecommunications. "You're utilizing the already available facilities and infrastructure for that, which can reduce the cost," says engineer Hossein Taheri, who is studying DAS for railroads at Georgia Southern University. "There could be some railroads where they don't have the fiber, and you need to lay down. But yes, most of them, usually they do already have it."

To tap into that fiber, you need a device called an interrogator, which fires laser pulses down the cables and analyzes the tiny bits of light that bounce back. So, say a rock hits the track 20 miles away from the interrogator. That creates a characteristic ground vibration that disturbs the fiber optics near the track, which shows up in the light signal. Because scientists know the speed of light, they can precisely measure the time it took for that signal to travel back to their interrogator, pinpointing the distance to the disturbance to within 10 meters, or about 30 feet. For a given stretch of track, you'd have already analyzed the DAS signals for a length of time, building a vibration profile for a normal, healthy railway. When the DAS data suddenly starts showing something different, you might have an issue, which shows up like an EKG picking up a problem with a human heartbeat. "What we're doing is profiling the track, looking for changes in the acoustic signature," says Daniel Pyke, a rail expert and spokesperson for Sensonic, which develops DAS technology for railroads. "We know what track should sound like, we know what a train should sound like. And we know that if it's changing -- so let's say this joint is coming loose -- that needs someone to go and fix it before it becomes a problem."

AI

George Carlin Estate Sues Creators Of AI-Generated Comedy Special (hollywoodreporter.com) 118

George Carlin's estate is suing over the release of a comedy special that uses generative AI to mimic the deceased comedian's voice and style of humor. From a report: The lawsuit, filed in California federal court on Thursday, accuses the creators of the special of utilizing without consent or compensation George Carlin's entire body of work consisting of five decades of comedy routines to train an AI chatbot, which wrote the episode's script. It also takes issue with using his voice and likeness for promotional purposes. The complaint seeks a court order for immediate removal of the special, as well as unspecified damages. It's among the first legal actions taken by the estate of a deceased celebrity for unlicensed use of their work and likeness to manufacture a new, AI-generated creation and was filed as Hollywood is sounding the alarm over utilization of AI to impersonate people without consent or compensation.
Hardware

Researchers Claim First Functioning Graphene-Based Chip (ieee.org) 4

An anonymous reader quotes a report from IEEE Spectrum: Researchers at Georgia Tech, in Atlanta, have developed what they are calling the world's first functioning graphene-based semiconductor. This breakthrough holds the promise to revolutionize the landscape of electronics, enabling faster traditional computers and offering a new material for future quantum computers. The research, published on January 3 in Nature and led by Walt de Heer, a professor of physics at Georgia Tech, focuses on leveraging epitaxial graphene, a crystal structure of carbon chemically bonded to silicon carbide (SiC). This novel semiconducting material, dubbed semiconducting epitaxial graphene (SEC) -- or alternatively, epigraphene -- boasts enhanced electron mobility compared with that of traditional silicon, allowing electrons to traverse with significantly less resistance. The outcome is transistors capable of operating at terahertz frequencies, offering speeds 10 times as fast as that of the silicon-based transistors used in current chips.

De Heer describes the method used as a modified version of an extremely simple technique that has been known for over 50 years. "When silicon carbide is heated to well over 1,000C, silicon evaporates from the surface, leaving a carbon-rich surface which then forms into graphene," says de Heer. This heating step is done with an argon quartz tube in which a stack of two SiC chips are placed in a graphite crucible, according to de Heer. Then a high-frequency current is run through a copper coil around the quartz tube, which heats the graphite crucible through induction. The process takes about an hour. De Heer added that the SEC produced this way is essentially charge neutral, and when exposed to air, it will spontaneously be doped by oxygen. This oxygen doping is easily removed by heating it at about 200C in vacuum. "The chips we use cost about [US] $10, the crucible about $1, and the quartz tube about $10," said de Heer. [...]

De Heer and his research team concede, however, that further exploration is needed to determine whether graphene-based semiconductors can surpass the current superconducting technology used in advanced quantum computers. The Georgia Tech team do not envision incorporating graphene-based semiconductors with standard silicon or compound semiconductor lines. Instead, they are aiming for a paradigm shift beyond silicon, utilizing silicon carbide. They are developing methods, such as coating SEC with boron nitride, to protect and enhance its compatibility with conventional semiconductor lines. Comparing their work with commercially available graphene field-effect transistors (GFETs), de Heer explains that there is a crucial difference: "Conventional GFETs do not use semiconducting graphene, making them unsuitable for digital electronics requiring a complete transistor shutdown." He says that the SEC developed by his team allows for a complete shutdown, meeting the stringent requirements of digital electronics. De Heer says that it will take time to develop this technology. "I compare this work to the Wright brothers' first 100-meter flight. It will mainly depend on how much work is done to develop it."

Medicine

World's First Partial Heart Transplant Grows Valves and Arteries (interestingengineering.com) 17

An anonymous reader quotes a report from Interesting Engineering: Marking a significant advancement in medical science, the world's first partial heart transplant has achieved the expected outcome after over a year of research efforts. Carried out by Duke Health, the patient, a young individual, now exhibits functioning valves and arteries that are growing in tandem with the transplant, as initially expected by the medical team. In spring 2022, doctors carried out the procedure on a baby who needed a new heart valve. Before, they used non-living valves, which didn't grow with the child. This meant the child needed frequent replacements, and the surgeries had a 50 percent chance of being deadly. The new procedure avoids these problems, according to the team.

Babies with serious heart valve problems face a tough challenge because there aren't any implants that can grow with them. So, these babies end up needing new implants over and over until they're big enough for an adult-sized valve. It's a problem that doesn't have a solution yet. Duke Health doctors, leading a study published in the Journal of the American Medical Association, discovered that the innovative valve collection method used in the partial heart transplant resulted in two properly functioning valves and arteries that are growing along with the child, resembling natural blood vessels. "This publication is proof that this technology works, this idea works, and can be used to help other children," said Joseph W. Turek, first author of the study and Duke's chief of pediatric cardiac surgery, in a statement.
The research also notes that the new procedure requires less immunosuppressant medication, reducing potential long-term side effects.

It also facilitates a "domino transplant" method, where one donor heart benefits multiple patients, potentially doubling the number of hearts available for children with heart disease by utilizing previously unused hearts and valves.
Microsoft

Microsoft Disables MSIX Protocol Handler Abused in Malware Attacks (bleepingcomputer.com) 11

Microsoft has again disabled the MSIX ms-appinstaller protocol handler after multiple financially motivated threat groups abused it to infect Windows users with malware. From a report: The attackers exploited the CVE-2021-43890 Windows AppX Installer spoofing vulnerability to circumvent security measures that would otherwise protect Windows users from malware, such as the Defender SmartScreen anti-phishing and anti-malware component and built-in browser alerts cautioning users against executable file downloads.

Microsoft says the threat actors use both malicious advertisements for popular software and Microsoft Teams phishing messages to push signed malicious MSIX application packages. "Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme (App Installer) to distribute malware," the company said.

Slashdot Top Deals